Exam 70-686 Windows 7, Enterprise Desktop Administrator
Published: November 20, 2009
Audiences: IT professionals
Technology: Windows 7
Credit toward certification: MCP, Specialist, MCITP
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.
Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.
Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.
If you have concerns about specific questions on this exam, please submit an exam challenge.
If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.
Planning and managing a client life cycle strategy (16%)
Plan and manage client licensing and activation
Applications and operating systems; activation method; KMS vs. MAK; prerequisites; choosing a SKU; licensing infrastructure; licensing compliance audits; inventory audits; virtualization licensing considerations; making recommendations for licensing strategy and compliance
Plan and manage software updates
Application updates and operating system updates; evaluating and approving software updates; enterprise applications; designing an update strategy; choosing an update tool; planning and deploying a service pack; schedule considerations; network considerations; test updates; auditing for security compliance
Plan and manage a physical hardware and virtualization strategy
Analyzing existing hardware environment; determining which systems meet minimum requirements; tradeoffs of physical vs. VDI environment; network load considerations; disk space; direct connection vs. brokered connection; determining a VHD strategy; choosing 32 bit vs. 64 bit
Licensing and volume activation
Application management and preparing for a Windows 7 deployment
Microsoft desktop virtualization strategy and product offerings
Designing a standard image (17%)
Design an image creation strategy
Identifying operating system and enterprise applications that will be included with the standard image; thick, thin, or hybrid; role-based or geographic-based images vs. single core image; image localization
Design a custom image
Identifying applications to be installed; identifying features and components to be enabled or disabled; testing the customized image
Define an image update strategy
Performance optimization; security considerations; efficiency; offline servicing vs. online or post-image updates; re-creating; recapturing
Choosing an image strategy and building Windows 7 system images
Phase 3: Preparing and customizing your Windows image
Phase 5: Managing and servicing your Windows image
Designing client configurations (17%)
Design standard system settings
Choosing methods, including logon scripts, startup scripts, and Group Policy; designing profiles; designing error reporting; designing audit policy
Define client security standards
Application control policies; encryption; stopping unnecessary services; designing firewall rules; defining anti-malware settings; changes to Kerberos and NTLM; configuring user rights; defining UAC policy; designing a security template for system lockdown; defining account policies; designing security standards for removable storage
Define Windows Internet Explorer settings
Local Group Policy editor
Windows Firewall with Advanced Security design guide
Change Internet Explorer security settings
Designing a Windows 7 client deployment (15%)
Analyze the environment and choose appropriate deployment methods
Building the infrastructure; advantages of lite-touch vs. zero-touch vs. local install; capacity and scale considerations; determining required changes to the infrastructure
Design a lite-touch deployment strategy
Unicast vs. multicast; auto-cast vs. scheduled-cast; staggered deployment; scheduling considerations; network load considerations; choosing a client boot method for deployment; unattended answer files; restricting who can receive images; choosing a delivery mechanism
Design a zero-touch deployment strategy
Designing and configuring task sequencing; unattended answer files; scheduling considerations; staggered deployment; network load considerations; restricting who can receive images
Design a user state migration strategy
Determining which user data and settings to preserve; local vs. remote storage considerations; determining mitigation plan for non-migrated applications; securing migrated data; testing designed strategy; wipe-and-load migration vs. side-by-side migration
Choose the right Microsoft deployment tool
Lite-Touch, High-Volume Deployment
Zero-Touch, High-Volume Deployment
Designing application packages for deployment (17%)
Design a delivery or deployment strategy
Auditing for prerequisites and minimum requirements; choosing a deployment method such as virtualized, Remote Desktop Services, Group Policy, or software distribution; server-based or client-based install; scheduling considerations; staggered deployment; network considerations; package creation standards
Manage application compatibility
Testing incompatibility; choosing a method for resolving incompatibility, such as upgrading, Remote Desktop Services, shim, or VDI; auditing incompatible software
Choosing a deployment strategy
Application compatibility for Windows 7: Unlocking the power of Application Shims
Identifying and resolving deployment and client configuration issues (19%)
Identify and resolve Internet Explorer issues
Security zones; Web applications; advanced settings; Group Policy restrictions; certificates
Identify and resolve Group Policy issues
Delegation; inheritance; policies are not effective; blocking; permissions; loopback processing; user vs. computer settings; filtering; performance
Identify and resolve networking issues
Wireless; remote access; VPN; certificates; performance; IP communication; Windows Firewall
Identify and resolve authentication and authorization issues
User rights; distinguishing between client-based and server-based issues; time synchronization (Kerberos)
Windows Firewall with Advanced Security troubleshooting guide: Diagnostics and tools
Windows 7: Troubleshooting and support
You are planning to upgrade Internet Explorer. You have the following requirements:
* Create a report that identifies which computers are successfully upgraded.
* Do not install additional software on the client computers.
You need to design a deployment method that meets the requirements. What should you do?
A. Use Windows Server Update Services (WSUS).
B. Use Internet Explorer Administration Kit (IEAK) and Group Policy.
C. Use Microsoft System Center Configuration Manager.
D. Use Microsoft System Center Essentials.
Your company has a single Active Directory Domain Services (AD DS) domain with Windows Server
2008 R2 member servers and 1,000 Windows 7 client computers. You are designing the
deployment of a custom application. You have the following requirements:
* The application must be available to only users who need it.
* Minimize network traffic during deployment.
You need to design a deployment strategy that meets the requirements. Which deployment
method should you use?
A. Microsoft Application Virtualization (App-V)
B. Microsoft System Center Configuration Manager 2007
C. RemoteApp and Desktop Connections
D. software installation in Group Policy
Your network consists of an Active Directory Domain Services (AD DS) forest with 1,000 client
computers that run Windows XP. Nine hundred of the computers are on the local area network.
One hundred computers are portable computers that connect to the main office only once every
few months. You are planning to deploy Windows 7. You need to generate a report of the software
that is installed on all client computers. You need this information as soon as possible. What should
A. Microsoft System Center Data Protection Manager
B. Microsoft Desktop Optimization Pack
C. Microsoft System Center Essentials
D. Microsoft System Center Operations Manager
Your network has client computers that run Windows Vista. You are planning to deploy Windows
7. You need to detect and analyze the compatibility of an application that requires elevated
privileges. What should you do?
A. Use the Standard User Analyzer (SUA) Wizard.
B. Run a virtual version of the Setup Analysis Tool (SAT).
C. Use the Standard User Analyzer (SUA) tool.
D. Run a stand-alone version of the Setup Analysis Tool (SAT).
Your company’s network has client computers that run Windows 7. Multiple users share the
computers in the shipping department. These computers reside in the Shipping Computers
organizational unit (OU). The company wants to deploy a new application. The application is not
packaged. You have the following requirements:
* Deploy the application to all computers in the shipping department.
* Perform the deployment from a central location.
You need to plan the software deployment process to meet the requirements. Which two actions
should you include in the process? (Each correct answer presents part of the solution. Choose two.)
A. Using Microsoft System Center Configuration Manager, create a collection that contains the
shipping department computers, and assign the package to the collection.
B. Create a package by using Microsoft System Center Configuration Manager.
C. Create a Group Policy object (GPO) and add a software installation policy under the Computer
D. In the Group Policy Management Console, link the software installation policy to the Shipping
E. Using Microsoft System Center Configuration Manager, create a collection that contains the
shipping department users, and assign the package to the collection.
Comments are closed.